Google Ads Introduces Three New Bidding Strategies

Google Ads Introduces Three New Bidding Strategies

Google has introduced three new bidding strategies for Google Ads advertisers that offer more flexibility than Smart Bidding. Advertisers will be able to set conversion goals at the campaign level. So Google Ads is introducing seasonality adjustments.

The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers

The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers

Siegel refers to a handful of firms globally, including Proven Data and MonsterCloud, as “ransomware payment mills.” They “demonstrate how easily intermediaries can prey on the emotions of a ransomware victim” by advertising “guaranteed decryption without having to pay the hacker,” he said in a blog post.

How Hackers Broke WhatsApp With Just a Phone Call

How Hackers Broke WhatsApp With Just a Phone Call

But a new Financial Times report alleges that the notorious Israeli spy firm NSO Group developed a WhatsApp exploit that could inject malware onto targeted phones—and steal data from them—simply by calling them.

IARPA Needs More Training Data for Video Surveillance Algorithms

IARPA Needs More Training Data for Video Surveillance Algorithms

The training data would improve the tech’s ability to link together footage from a large network of security cameras, allowing it to better track and identify potential targets.

San Francisco Is Preparing to Ban Facial Recognition Technology

San Francisco Is Preparing to Ban Facial Recognition Technology

As facial recognition technology makes its presence felt across the globe, the city of San Francisco is preparing to ban its use by local agencies.

New secret-spilling flaw affects almost every Intel chip since 2011

New secret-spilling flaw affects almost every Intel chip since 2011

Security researchers have found a new class of vulnerabilities in Intel chips which, if exploited, can be used to steal sensitive information directly from the processor.,.

Microsoft Launches Decentralized Identity Tool on the Bitcoin Blockchain

Microsoft Launches Decentralized Identity Tool on the Bitcoin Blockchain

York Rhodes, a programme manager on Microsoft’s Blockchain Engineering Team, mentioned to CoinDesk that the Microsoft team has been working for a year on a key signing validation software founded on public networks like Bitcoin or Ethereum, and one that can handle a great number of throughput than the underlying Blockchain on which it is run.

WhatsApp urges users to update app after discovering spyware vulnerability

WhatsApp urges users to update app after discovering spyware vulnerability

WhatsApp is encouraging users to update to the latest version of the app after discovering a vulnerability that allowed spyware to be injected into a user’s phone through the app’s phone call function.

WhatsApp exploit let attackers install government-grade spyware on phones

WhatsApp exploit let attackers install government-grade spyware on phones

“WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices,” the company said in a statement.

Mobilizon: let’s finance a software to free our events from Facebook! – Framablog

Mobilizon: let’s finance a software to free our events from Facebook! – Framablog

Less than 60 days to promote our project of a free and federated alternative to Facebook events ; and to know how much we need to invest ourselves in it.

“Digital strip-searches”: police increasingly downloading everything from smartphones – including from crime victims

“Digital strip-searches”: police increasingly downloading everything from smartphones – including from crime victims

For example, it has emerged that victims of crimes in the UK are being asked to hand over their mobile phones and social media accounts so that the police can download all the contents in the search for “relevant” information.

How I Tried to Defy the Facebook Algorithm

How I Tried to Defy the Facebook Algorithm

The tool has directed me to corners of Facebook that feel like mini-vacations from the usual onslaught of life updates and political news: pages devoted to intellectual-property rights, items for sale in small-town Maryland, and the apparently beloved 20th-century organist Virgil Fox. This approach to browsing can work on other social-media platforms, too.

“Users want control” is a shoulder shrug

“Users want control” is a shoulder shrug

If the person wants to determine their own path, if having choice is itself a personal goal , then you need control. People don’t want to lose their data, but having personal control over your data is a great way to lose it, or even to lose control over it.

Researcher Finds CSS-Only Method to Track Mouse Movements

Researcher Finds CSS-Only Method to Track Mouse Movements

Wybiral was able to do this by creating a grid of HTML DIVs that utilize CSS :hover selectors to request a new background image when your mouse moves over a box on the grid.

Google promises app developers more ad monetization options

Google promises app developers more ad monetization options

Google today announced that app developers will soon be able to bid on a target return on ad spend (tROAS).

Binance says more than $40 million in bitcoin stolen in ‘large scale’ hack [Updated]

Binance says more than $40 million in bitcoin stolen in ‘large scale’ hack [Updated]

In a statement, the company said hackers stole API keys, two-factor codes and other information in the attack. It will be about a week before Binance can release withdrawals or accept deposits again because it needs to “make sure we completely eradicate any trace of hackers in all our accounts and data and that is a pretty tedious process,” Zhao said.

Tails - Tails 3.13.2 is out

Tails - Tails 3.13.2 is out

To display the system tray, move your mouse to the thin gray line in the bottom-left of the screen, above the window list: To move these icons back to the top navigation bar, execute the following command in a Terminal: gnome-shell-extension-tool --enable-extension=TopIcons@.

ICO says that voice data collected unlawfully by HMRC should be deleted

ICO says that voice data collected unlawfully by HMRC should be deleted

The ICO issued a preliminary enforcement notice to HMRC on April 4, 2019 stating the Information Commissioner’s initial decision to compel the department to delete all biometric data held under the Voice ID system for which it does not have explicit consent.

Google will let you better control your privacy

Google will let you better control your privacy

Google has finally introduced an option that gives you the ability to automatically erase all your location and activity history on the Web. This is a feature that comes with the goal of putting more tools in the hands of users so they can control how your data is used.

The Challenges of Ethical Hacking – A Minefield of Legal and Ethical Woes

The Challenges of Ethical Hacking – A Minefield of Legal and Ethical Woes

Depending on the organization that you’re dealing with, responses can be as positive as interested engagement and proactively fixing an issue, to dismissive and uninterested, to actively hostile and ready to pursue legal action.

The Microsoft Outlook hackers are stealing victims’ Bitcoin

The Microsoft Outlook hackers are stealing victims’ Bitcoin

“The hackers also had access to my inbox allowing them to password reset my account and withdrawal [sic] my Bitcoin,” Jevon Ritmeester, a Microsoft user affected by the data breach, told Motherboard.

California Birth Index

California Birth Index

The CABI does not contain the same information as a birth certificate. Although birth records in California are publicly available, only certain persons may obtain an authorized copy. Anyone not on the list of authorized persons may obtain an informational copy.

“We want your money, not your data” or how we wrote this [kick-ass] slogan

“We want your money, not your data” or how we wrote this [kick-ass] slogan

A slogan should quickly get your message across, so we first had to understand what’s the one thing we want people to know about Unio. That’s why we wouldn’t be able to sell to advertisers (as some tech companies do) or reveal it to authorities, even if we wanted to.

United Airlines Covers Creepy Cameras On Its Seatback Screens Following Outcry

United Airlines Covers Creepy Cameras On Its Seatback Screens Following Outcry

In a statement, a United Airlines spokesperson said: “As with many other airlines, some of our premium seats have in-flight entertainment systems that came with cameras installed by the manufacturer.

No KYC Exchanges List

No KYC Exchanges List

This is a verified list of cryptocurrency bitcoin exchanges that have no KYC/AML and don’t need documents to trade. Exchanges that let you trade Bitcoin, Ethereum etc futures, perpetual markets and margin leverage with no ID verification and no KYC check.

Ola Bini arrested in Ecuador

Ola Bini arrested in Ecuador

Ola Bini, @olabini, a world-renowned figure in the field of free software and defender of digital rights and privacy, was arrested at the airport in Quito, Ecuador at 3:20 p.m. local time on April 11, 2019.

Integrating Network-Layer Privacy Protections With Cryptocurrencies

Integrating Network-Layer Privacy Protections With Cryptocurrencies

While significant effort has focused on protocol-layer protections, publications mapping IP addresses through tracking transaction broadcast origins and subsequently making connections with identities (through public keys) have amplified concerns that protocol-layer solutions are not the only means needed to safeguard privacy.

The Time Tim Cook Stood His Ground Against the FBI

The Time Tim Cook Stood His Ground Against the FBI

At 4:30 a.m., just in time for the morning news cycle on the East Coast, Cook published an open letter to Apple customers explaining why the company would be opposing the ruling, which “threatens the security of our customers.” He referenced the danger that could come from the government having too much power: “The implications of the government’s demands are chilling,” he wrote.

Senate Bill Bans ‘Dark Patterns’ Trickery in Social Media Data Collection

Senate Bill Bans ‘Dark Patterns’ Trickery in Social Media Data Collection

Some of the most nefarious strategies rely on ‘dark patterns’ — deceptive interfaces and default settings, drawing on tricks of behavioral psychology, designed to undermine user autonomy and push consumers into doing things they wouldn’t otherwise do, like hand over all of their personal data to be exploited for commercial purposes,” said U.S. Sen. Mark Warner (D-Va.), a former technology executive who is vice chairman of the Senate Select Committee on Intelligence.

Zuck’s back, calling for “new rules” for the Internet, which will entrench Facebook’s power, but do nothing for privacy

Zuck’s back, calling for “new rules” for the Internet, which will entrench Facebook’s power, but do nothing for privacy

More specifically, Zuckerberg is calling for new regulations in four areas: harmful content, election integrity, privacy and data portability. Although it is good to know who pays for what ads, and who sees them, the real problem lies at the point where Facebook helps advertisers to send micro-targeted political ads to people.

More